anonymous communication.docx

1
Anonymous communication API security Application analysis Banking security Chip and PIN (EMV) security, ATM phantom withdrawals Biometric identification iris recognition, biometric cryptography Compromising emanations eavesdropping risks of video displays, soft tempest, compromising video emanations signal processor Deterrence of deception Economics of information security Hardware security microcontroller security, FPGAs, semi-invasive attacks on depackaged semiconductor circuits, PIN mailer security Medical information security Location and positioning systems Navigation signal security, RFID, relay attacks, distance bounding protocols OTPW – one-time password authentication system Privacy and freedom issues Security protocols SOAAP software analysis LLVM-based compartmentalisation analysis Social networking and privacy Cryptology (publications) block ciphers (Serpent, BEAR, LION, TEA, XTEA), stream ciphers (Chameleon), hash functions (Tiger) Steganography, information hiding, digital watermarks Electronic commerce

Upload: prateek-khanna

Post on 13-Jul-2016

215 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Anonymous communication.docx

Anonymous communication

API security

Application analysis

Banking security Chip and PIN (EMV) security, ATM phantom withdrawals

Biometric identification iris recognition, biometric cryptography

Compromising emanations eavesdropping risks of video displays, soft tempest, compromising video emanations signal processor

Deterrence of deception

Economics of information security

Hardware security microcontroller security, FPGAs, semi-invasive attacks on depackaged semiconductor circuits, PIN mailer security

Medical information security

Location and positioning systems Navigation signal security, RFID, relay attacks, distance bounding protocols

OTPW – one-time password authentication system

Privacy and freedom issues

Security protocols

SOAAP software analysis LLVM-based compartmentalisation analysis

Social networking and privacy

Cryptology (publications) block ciphers (Serpent, BEAR, LION, TEA, XTEA), stream ciphers (Chameleon), hash functions (Tiger)

Steganography, information hiding, digital watermarks

Electronic commerce